SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start


From course:

CISSP

» Start this Course
(Practice similar questions for free)
Question:

Enumeration. This is the second step in the penetration test methodology and builds on the information gathered during the discovery phase and is specifically directed at the targeted systems, applications, and networks.

Author: John Intindolo



Answer:

Which step of a penetration test involves performing port scans to discover information about a target? - Exploitation - Enumeration - Reconnaissance - Vulnerability mapping


0 / 5  (0 ratings)

1 answer(s) in total